GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: Artificial intelligence. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (711 pages)
    Edition: 1st ed.
    ISBN: 9783319286587
    Series Statement: Advances in Intelligent Systems and Computing Series ; v.425
    DDC: 621.3822
    Language: English
    Note: Intro -- Preface -- Organization -- Contents -- Biometrics/Digital Watermarking/Recognition Systems -- Emotion Recognition from Facial Expressions for 4D Videos Using Geometric Approach -- 1 Introduction -- 2 Background Work -- 3 Proposed Method -- 3.1 Automatic Peak Detection -- 3.2 Feature Extraction -- 3.3 Classification Using Support Vector Machine -- 3.4 Classification Using Random Forests -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Fraudulent Image Recognition Using Stable Inherent Feature -- 1 Introduction -- 2 Related Works -- 3 Proposed System -- 3.1 Image Splicing Detection -- 3.2 Copy-Move Forgery Detection -- 4 Experiment Re esults and Comparisons -- 4.1 Choosing of Denoising Filter -- 4.2 Component De etection -- 4.3 Copy-Move Fo rgery Detection -- 4.4 After JPEG Co ompression -- 5 Conclusion and Future Works -- References -- Kernel Visual Keyword Description for Object and Place Recognition -- 1 Introduction& -- -- 2 Related Works -- 3 SURF and PCA -- 4 SURF Features -- 5 Histogram of Gradient -- 6 Combining KPCA and HOG Naively -- 7 Classification and Optimization -- 8 Simulation and Implementation -- 8.1 IDOL Dataset -- 8.2 Caltech101 Dataset -- 9 Discussion -- 10 Conclusion -- References -- Hardware Accelerator for Facial Expression Classification Using Linear SVM -- 1 Introduction -- 2 Software Implementation of OVA Linear SVM -- 2.1 Classifier Training and Testing Using LibSVM Library -- 3 Proposed Hardware Architecture of OVA Linear SVM -- 3.1 Input Feature Storage Block -- 3.2 Support Vector Storage Block -- 3.3 Yalpha Values Storage Block -- 3.4 Kernel Computation Block -- 3.5 Temporary Storage Block -- 3.6 Counters Block -- 3.7 Decision Value Computation Block -- 3.8 Decision Function and SVM Classification Block -- 3.9 Controller Block -- 4 Simulation and Synthesis Result -- 5 Conclusion. , References -- Enhancing Face Recognition Under Unconstrained Background Clutter Using Color Based Segmentation -- 1 Introduction -- 2 Face Recognition Algorithms -- 2.1 Eigenfaces -- 2.2 2-Dimensional PCA -- 2.3 Row Column 2DPCA (RC2DPCA) -- 2.4 Other Forms of PCA -- 3 Color Segmentation -- 4 Experimental Results and Discussion -- 5 Conclusion -- References -- Emotion Recognition from 3D Images with Non-Frontal View Using Geometric Approach -- 1 Introduction -- 2 Background Work -- 3 Proposed Methods for Emotion Recognition -- 3.1 Distance and Angle Vector Method -- 3.2 Normalized Euclidean Distance Method -- 4 Results and Analysis -- 5 Conclusion and Future Work -- References -- Real-Time Automatic Camera Sabotage Detection for Surveillance Systems -- 1 Introduction -- 2 Related Works -- 3 Background Modelling -- 3.1 Development of Background Model -- 3.2 Object Extraction -- 4 Proposed Method -- 5 Experimental Results and Discussion -- 6 Conclusion and Future Scope -- References -- An Improved Approach to Crowd Event Detection by Reducing Data Dimensions -- 1 Introduction -- 2 Related Work -- 2.1 Dimensionality Reduction Methods -- 2.2 Crowd Event Detection -- 3 Methodology -- 3.1 Preprocessing and Feature Extraction -- 3.2 Haar Wavelet Transform -- 3.3 Dimensionality Reduction and Classification -- 4 Results and Discussion -- 4.1 Dataset -- 4.2 Experiment -- 5 Conclusion -- References -- Art of Misdirection Using AES, Bi-layer Steganography and Novel King-Knight's Tour Algorithm -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Encryption and Embedding Phase -- 2.2 Extraction and Decryption Phase -- 3 Results and Discussions -- 4 Conclusions -- References -- Digital Watermarking Using Fractal Coding -- 1 Introduction -- 2 Proposed Meth hod -- 2.1 Procedure for E Embedding Watermark -- 2.2 Procedure for W Watermark Extraction. , 3 Experimental R Results -- 4 Conclusion -- References -- A Cheque Watermarking System Using Singular Value Decomposition for Copyright Protection of Cheque Images -- 1 Introduction -- 2 Various Technique Used For Digital Image Watermarking -- 2.1 Frequency Domain -- 2.2 Computational Intelligence Techniques -- 2.3 Spatial Domain -- 3 Working of Singular Valued Decomposition Transform -- 3.1 Singular Valued Decomposition Transform -- 3.2 Watermark Embedding Algorithm Using Singular Value Decomposition Transform -- 3.3 Watermark Extraction Algorithm Using Singular Value Decomposition Transform -- 4 Calculating Imperceptibility of Watermarked Cheque Image -- 5 Experiment and Results -- 5.1 For Gain Facto or or value of alpha as constant =1 -- 6 Conclusion -- References -- Biometric Watermarking Technique Based on CS Theory and Fast Discrete Curvelet Transform for Face and Fingerprint Protection -- 1 Introduction -- 2 Fast Discrete Curvelet Transform (FDCT) -- 3 Proposed Watermarking Technique -- 3.1 Watermark Preparation and Embedding -- 3.2 Watermark Extraction and Reconstruction -- 4 Experimental Results and Discussion -- 5 Effect of Proposed Watermarking Technique for Performance of Multibiometric System -- 6 Conclusion -- References -- Cancelable Fingerprint Cryptosystem Based on Convolution Coding -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Fingerprint Image Preprocessing and Feature Extraction -- 3.2 Computation of Transformed Features Using Delaunay Triangulation Net Constructed from Minutiae Points -- 3.3 Representing the Transformed Features as Fixed Length Bit Strings -- 3.4 Encode the Bit String Using Convolution Coding in Fuzzy Commitment Scheme -- 3.5 Convolution Coding and Decoding -- 3.6 Fuzzy Commitment Scheme -- 3.7 Matching -- 4 Experiment, Analysis and Discussion -- 4.1 Accuracy -- 4.2 Changeability. , 4.3 Security Analysis -- 5 Performance Comparison with Existing Fingerprint Template Protection Schemes -- 6 Conclusion -- References -- A Bio-cryptosystem for Fingerprints Using Delaunay Neighbor Structures(DNS) and Fuzzy Commitment Scheme -- 1 Introduction -- 2 Related Work -- 3 Proposed Method -- 3.1 Computation of Delaunay Neighbor Structures(DNS) from Fingerprint Minutiae -- 3.2 Computation of Bit String for Each DNS -- 3.3 Apply Dimensionality Reduction Matrix to Each Bit String -- 3.4 Encode Each Bit String Using BCH Code in Fuzzy Commitment Scheme -- 3.5 Matching -- 4 Experiment, Analysis and Discussion -- 4.1 Experiment Setup and Performance Measures -- 4.2 Accuracy -- 4.3 Revocability -- 4.4 Security Analysis -- 5 Performance Comparison with Existing Fingerprint Template Protection Schemes -- 6 Conclusion -- References -- Part II Image/ Video Processing -- Improving the Feature Stability and Classification Performance of Bimodal Brain and Heart Biometrics& -- -- 1 Introduction -- 2 Methodology -- 2.1 ECG Signal Processing -- 2.2 EEG Signal Processing -- 2.3 Classification -- 3 Results and Discussion -- 4 Conclusion -- References -- Denoising Multi-coil Magnetic Resonance Imaging Using Nonlocal Means on Extended LMMSE -- 1 Introduction -- 2 Related Work -- 3 Proposed Approach -- 4 Experiments and Results -- 5 Conclusion -- Appendix 1. Nonlocal Means method -- Appendix 2. Extended LMMSE Method -- Appendix 3. Mean Squared Error -- Appendix 4. Peak Signal to Noise Ratio -- References -- An Intelligent Blind Semi-fragile Watermarking Scheme for Effective Authentication and Tamper Detection of Digital Images Using Curvelet Transforms -- 1 Introduction -- 2 Discrete Curvelet Transform -- 3 Proposed Semi-fragile Watermarking Scheme -- 3.1 Watermark Embedding -- 3.2 Watermark Extraction -- 4 Experimental Results -- 5 Discussions. , 5.1 Robustness Analysis -- 5.2 Fragility Analy ysis -- 6 Conclusions -- References -- Dental Image Retrieval Using Fused Local Binary Pattern & -- Scale Invariant Feature Transform -- 1 Introduction -- 2 Literature Survey -- 3 Feature Extraction Methods -- 3.1 Local Binary Pattern (LBP) -- 3.2 Scale Invariant Feature Transform (SIFT) -- 4 Proposed Methodology Fused LBP and SIFT -- 4.1 Image Retrieval Using Similarity Measures -- 4.2 Dental Image Retrieval Process -- 5 Experimental Results -- 6 Conclusion -- References -- Block Based Variable Step Size LMS Adaptive Algorithm for Reducing Artifacts in the Telecadiology System -- 1 Introduction -- 2 Basic Least Mean Square (LMS) Adaptive Algorithm -- 3 Proposed Block Based Error Data Normalized VSSLMS Algorithm -- 4 Simulation Analysis -- 5 Conclusion -- References -- Braille Tutor -- A Gift for the Blind -- 1 Introduction -- 2 Methodology -- 2.1 Description -- 3 Implementation -- 4 Results and Evaluation -- 5 Conclusion -- References -- Performance Evaluation of S-Golay and MA Filter on the Basis ofWhite and Flicker Noise -- 1 Introduction -- 2 Synthesis of Synthetic EEG Signal -- 3 Addition of White and Pink Noise in the Synthetic EEG Signal -- 4 Application of Savitzy-Golay Filter to the Noisy Signal -- 5 Moving Average Filter -- 6 Signal to Noise Ratio(SNR) of EEG Signal -- 7 Evaluation of Signal Distortion -- 8 Peak Detection -- 9 Application of Filters on Real EEG Signal -- 10 Results and Discussion -- 11 Conclusion -- References -- An Efficient Multi Object Image Retrieval System Using Multiple Features and SVM -- 1 Introduction -- 2 Proposed Methodology -- 2.1 Preparing the Database -- 2.2 Feature Extraction -- 3 Support Vector Machine -- 4 Results -- 5 Discussions -- References. , Blood Cells Counting by Dynamic Area-Averaging Using Morphological Operations to SEM Images of Cancerous Blood Cells.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Berlin, Heidelberg :Springer Berlin / Heidelberg,
    Keywords: Automatic classification. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (324 pages)
    Edition: 1st ed.
    ISBN: 9783540496076
    Series Statement: Natural Computing Series
    DDC: 519.72
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Newark :John Wiley & Sons, Incorporated,
    Keywords: Bioinformatics. ; Computational biology. ; Artificial intelligence. ; Pattern recognition systems. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (395 pages)
    Edition: 1st ed.
    ISBN: 9780470872345
    Series Statement: Wiley Series in Bioinformatics Series ; v.13
    DDC: 570.285
    Language: English
    Note: Intro -- COMPUTATIONAL INTELLIGENCE AND PATTERN ANALYSIS IN BIOLOGICAL INFORMATICS -- CONTENTS -- Preface -- Contributors -- PART I INTRODUCTION -- 1 Computational Intelligence: Foundations, Perspectives, and Recent Trends -- 2 Fundamentals of Pattern Analysis: A Brief Overview -- 3 Biological Informatics: Data, Tools, and Applications -- PART II SEQUENCE ANALYSIS -- 4 Promoter Recognition Using Neural Network Approaches -- 5 Predicting microRNA Prostate Cancer Target Genes -- PART III STRUCTURE ANALYSIS -- 6 Structural Search in RNA Motif Databases -- 7 Kernels on Protein Structures -- 8 Characterization of Conformational Patterns in Active and Inactive Forms of Kinases using Protein Blocks Approach -- 9 Kernel Function Applications in Cheminformatics -- 10 In Silico Drug Design Using a Computational Intelligence Technique -- PART IV MICROARRAY DATA ANALYSIS -- 11 Integrated Differential Fuzzy Clustering for Analysis of Microarray Data -- 12 Identifying Potential Gene Markers Using SVM Classifier Ensemble -- 13 Gene Microarray Data Analysis Using Parallel Point Symmetry-Based Clustering -- PART V SYSTEMS BIOLOGY -- 14 Techniques for Prioritization of Candidate Disease Genes -- 15 Prediction of Protein-Protein Interactions -- 16 Analyzing Topological Properties of Protein-Protein Interaction Networks: A Perspective Toward Systems Biology -- Index -- Wiley Series on Bioinformatics: Computational Techniques and Engineering.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...